Sciweavers

6555 search results - page 1089 / 1311
» Secure attribute-based systems
Sort
View
118
Voted
CASCON
2006
131views Education» more  CASCON 2006»
15 years 5 months ago
STAC: software tuning panels for autonomic control
One aspect of autonomic computing is the ability to identify, separate and automatically tune parameters related to performance, security, robustness and other properties of a sof...
Elizabeth Dancy, James R. Cordy
140
Voted
COMCOM
2008
135views more  COMCOM 2008»
15 years 3 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan
223
Voted

Lecture Notes
1005views
17 years 3 months ago
Lectures on reconfigurable computing
Driven by recent innovations in Field-Programmable Gate Arrays (FPGAs), reconfigurable computing offers unique ways to accelerate key algorithms. FPGAs offer a programmable logic f...
Sherief Reda
65
Voted
CHI
2009
ACM
16 years 4 months ago
Real life challenges in access-control management
In this work we ask the question: what are the challenges of managing a physical or file system access-control policy for a large organization? To answer the question, we conducte...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
135
Voted
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
16 years 4 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
« Prev « First page 1089 / 1311 Last » Next »